Skip to main content

Bio-informatics with Genetic Steganography Technique

  • Chapter
  • First Online:
Computational Intelligence and Efficiency in Engineering Systems

Part of the book series: Studies in Computational Intelligence ((SCI,volume 595))

Abstract

Biological systems have been a rich source of stimulation for computer security specialists. A wide number of approaches have been proposed over the last decade for encoding data using deoxyribo nucleic acid (DNA), giving rise to the developing area of DNA data hiding. In this work, a new data hiding technique based upon DNA characteristic have been developed. DNA matrix has been used to represent the secret message. After that DNA matrix converted to Quick Response (QR) representation that offers a broad scope of practical usage. In addition, the paper provides an idea of choosing the optimal locations of the QR in order to obtain rightmost position. A new system based on the genetic algorithm has been developed. Finally, we embed the QR codes into the most appropriate location by applying the Haar Wavelet technique on the resulting DNA signals and LSB with assist of the GA in order to reduce the error between the cover image and the stego image. Experimental results have presented a high PSNR which indicate a high level of quality in stego-image with high capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adleman, L.: Computing with DNA: the manipulation of DNA to solve mathematical problems is redefining what is meant by computation. Sci. Am. (1998)

    Google Scholar 

  2. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)

    Article  MATH  Google Scholar 

  3. Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: 3rd International Conference on Bio-Inspired Computing: Theories and Applications, September 2008. 37–42

    Google Scholar 

  4. Dan Boneh, J.S., Dunworth, C., Lipton, R.J.: On the computational power of DNA. Discret. Appl. Math. 71, 79–94 (1995)

    Article  Google Scholar 

  5. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in scale images. IEEE Multimed. 8, 22–28 (2001)

    Article  Google Scholar 

  6. Guo, C., Chang, C.-C., Wang, Z.-H.: A new data hiding scheme based on DNA sequence. Int. J. Innov. Comput. Inf. Control 8(1), 139–149 (2012)

    Google Scholar 

  7. Holland, J.: Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence [Paperback]. MIT Press, Cambridge (1992)

    Google Scholar 

  8. Kari, L.: From Micro-soft to Bio-soft: computing with DNA. World Sci. 1642, 1–20 (1997)

    Google Scholar 

  9. Kumar D., Singh S.: Secret data writing using DNA sequences. In: 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), April 2011, pp. 402–405 (2011)

    Google Scholar 

  10. Leier, A., Richter, C., Banzhaf, W., Rauhe, H.: Cryptography with DNA binary strands. Biosystems 57(1), 13–22 (2000)

    Article  Google Scholar 

  11. Magdy, A., Saeb, M., Mohamed, A.B., Khadragi, A.: Haar wavelet transform of the signal representation of DNA sequences. Haar Wavelet Transform of the Signal Representation of DNA Sequences, p. 1 (2011)

    Google Scholar 

  12. Mousa, H., Moustafa, K., Abdel-wahed, W., Hadhoud, M.: Data hiding based on contrast mapping using DNA medium, 8(2), (2011)

    Google Scholar 

  13. Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A digital watermark (1994)

    Google Scholar 

  14. Shiu, H., Ng, K., Fang, J., Lee, R., Huang, C.: Data hiding methods based upon DNA sequences. Inf. Sci. 180(11), 2196–2208 (2010)

    Article  MathSciNet  Google Scholar 

  15. Wang, X., Zhang, Q.: DNA computing-based cryptography. In: 2009 Fourth International on Conference on Bio-Inspired Computing, October 2009, pp. 1–3 (2009)

    Google Scholar 

  16. Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2002)

    Google Scholar 

  17. Wazirali, R.A., Chaczko, Z., Kale, A.: Digital Multimedia Archiving Based on Optimization Steganography System. IEEE (2014)

    Google Scholar 

  18. Wu, Y.-T., Shih, F.Y.: Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans. Syst., Man, Cybern. Part B, Cybern.: Publ. IEEE Syst., Man, Cybern. Soc., 36(1):24–31 Febuary 2006

    Google Scholar 

  19. Xiao, G., Lu, M., Qin, L., Lai, X.: New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51(12), 1413–1420 (2006)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raniyah Wazirali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Wazirali, R., Chaczko, Z., Carrion, L. (2015). Bio-informatics with Genetic Steganography Technique. In: Borowik, G., Chaczko, Z., Jacak, W., Łuba, T. (eds) Computational Intelligence and Efficiency in Engineering Systems. Studies in Computational Intelligence, vol 595. Springer, Cham. https://doi.org/10.1007/978-3-319-15720-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15720-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15719-1

  • Online ISBN: 978-3-319-15720-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics